• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 52
  • 47
  • 12
  • 11
  • 6
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 153
  • 153
  • 40
  • 31
  • 27
  • 25
  • 22
  • 22
  • 20
  • 19
  • 19
  • 18
  • 17
  • 16
  • 16
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Modelagem de sistemas de proteção técnica contra incêndio em edifícios inteligentes através de rede de Petri. / Modeling of fire protection systems in intelligent building through Petri net.

Percy Javier Igei Kaneshiro 01 December 2006 (has links)
O sistema de proteção técnica contra incêndio (SPTCI) é um dos principais sistemas que compõem o edifício inteligente (EI), pois a eficiência do seu funcionamento afeta diretamente a segurança das pessoas e o patrimônio do prédio. O SPTCI é composto de diferentes dispositivos, estratégias de controle e atua segundo legislação específica. Devido à complexidade do SPTCI, torna-se fundamental uma modelagem adequada que permita verificar a dinâmica do sistema e sua relação com outros sistemas prediais. Neste contexto, este trabalho propõe um procedimento para a modelagem e análise de estratégias de controle para o SPTCI, integrado com outros sistemas prediais dentro do contexto de EI. A abordagem considerada para este propósito baseia-se na teoria dos sistemas a eventos discretos, na aplicação de técnicas derivadas da rede de Petri e em técnicas de análise através de simulação discreta. Com esta abordagem são desenvolvidos modelos do sistema de controle do SPTCI onde é considerada a sua relação com outros sistemas prediais. Particularmente, explora-se as extensões da rede de Petri como as técnicas Production Flow Schema e Mark Flow Graph. Um estudo de caso é apresentado para ilustrar as principais características deste procedimento. / From the point of view of property damage and personal security, the fire protection system (FPS) is one of the most important systems in an intelligent building (IB). The FPS is composed of several devices and control strategies. Furthermore, it must act in accordance with specific laws. As a consequence the design of FPSs is a complex task and it is very important to provide an adequate model that supports the verification of the FPS dynamics and its integration with others building systems, facilitating its test and validation. In this context, this work proposes a procedure to model in a systematic and rational way a FPS in the IB context. Considering the nature of the structure and processes of FPS the approach is based on the discrete event dynamic system theory and the application of the Petri net. Then, the models the FPS control system and the controlled plant must include its integration with other building systems. Particularly, it explores Petri net extensions such as Production Flow Schema and Mark Flow Graph techniques. Through an example it is illustrated the main aspects of the proposed procedure.
122

Ingénierie de modèle pour la sécurité des systèmes critiques ferroviaires / Model based system engineering for safety of railway critical systems

Sun, Pengfei 24 July 2015 (has links)
Le développement et l’application des langages formels sont un défi à long terme pour la science informatique. Un enjeu particulier est l’acceptation par l’industrie. Cette thèse présente une approche pour la modélisation et la vérification des postes d’aiguillage français. La première question est la modélisation du système d’enclenchement par les réseaux de Petri colorés (RdPC). Un cadre de modélisation générique et compact est introduit, dans lequel les règles d’enclenchement sont modélisées dans une structure hiérarchique, tandis que les installations sont modélisées dans une perspective géographique. Ensuite, un patron de modèle est présenté. C’est un modèle paramétré qui intègre les règles nationales françaises qui peut être appliquée pour différentes gares. Puis, un concept basé sur l’événement est présenté dans le processus de modélisation des parties basses des postes d’aiguillage. La deuxième question est la transformation des RdPCs en machines B, qui va aider les concepteurs sur la route de l’analyse à application. Tout d’abord, une méthodologie détaillée, s’appuyant sur une table de correspondance, du RdPCs non-hiérarchiques vers les notations B est présentée. Ensuite, la hiérarchie et la priorité des transitions du RdPC sont successivement intégrées dans le processus de mapping, afin d’enrichir les possibilités de types de modèles en entrées de la transformation. Les machines B produites par la transformation permettent la preuve automatique intégrale par l’Atelier B. L’ensemble de ces travaux, chacun à leur niveau, contribuent à renforcer l’efficacité d’un cadre global d’analyse sécuritaire / Development and application of formal languages are a long-standing challenge within the computer science domain. One particular challenge is the acceptance of industry. This thesis presents some model-based methodologies for modelling and verification of the French railway interlocking systems (RIS). The first issue is the modellization of interlocking system by coloured Petri nets (CPNs). A generic and compact modelling framework is introduced, in which the interlocking rules are modelled in a hierarchical structure while the railway layout is modelled in a geographical perspective. Then, a modelling pattern is presented, which is a parameterized model respecting the French national rules. It is a reusable solution that can be applied in different stations. Then, an event-based concept is brought into the modelling process of low-level part of RIS to better describe internal interactions of relay-based logic. The second issue is the transformation of coloured Petri nets into B machines, which can help designers on the way from analysis to implementation. Firstly, a detailed mapping methodology from non-hierarchical CPNs to abstract B machine notations is presented. Then the hierarchy and the transition priority of CPNs are successively integrated into the mapping process, in order to enrich the adaptability of the transformation. This transformation is compatible with various types of colour sets and the transformed B machines can be automatically proved by Atelier B. All these works at different levels contribute towards a global safe analysis framework
123

Contribution à l'analyse de performances des Systèmes à Evénements Discrets non linéaires dans l'algèbre (min,+) / Contribution to the performance analysis of nonlinear Discrete Events Systems in (min, +) algebra

Benfekir, Abderrahim 19 December 2013 (has links)
Cette thèse s'inscrit dans le cadre de la théorie des systèmes linéaires dans les dioïdes. Cette théorie concerne la sous-classe des systèmes à événements discrets modélisables par les Graphes d'Événements Temporisés (GET). La dynamique de ces graphes peut être représentée par des équations récurrentes linéaires sur des structures algébriques particulières telles que l'algèbre (max,+) ou l'algèbre (min,+).Ce mémoire est consacré à l'analyse de performances des systèmes dynamiques qui peuvent être modélisés graphiquement par des Graphes d'Événements Temporisés Généralisés (GETG). Ces derniers, contrairement au GET, n'admettent pas une représentation linéaire dans l'algèbre (min,+). Pour pallier à ce problème de non linéarité, nous avons utilisé une approche de modélisation définie sur un dioïde d'opérateurs muni de deux lois internes : loi additive correspondant à l'opération (min), et loi multiplicative équivalente à la loi de composition usuelle. Le modèle d'état obtenu, est utilisé pour évaluer les performances des GETG. Pour cela, nous avons proposé une nouvelle méthode qui a pour but de linéariser le modèle mathématique régissant l'évolution dynamique du modèle graphique, dans le but d'obtenir un modèle (min,+) linéaire. La deuxième partie de cette thèse est consacrée au problème qui consiste à déterminer les ressources à utiliser dans une ligne de production, en vue d'atteindre des performances souhaitée. Ceci est équivalent à déterminer le marquage initial de la partie commande du GETG. / This thesis is part of the theory of linear systems over dioids. This theory concerns the subclass of discrete event dynamic systems modeled by Timed Event Graphs (TEG). The dynamics of these graphs can be represented by linear recurrence equations over specific algebraic structures such as (max,+) algebra or (min,+) algebra.This report is devoted to the performance analysis of dynamic systems which can be represented graphically by Generalized Timed Event Graphs(GTEG). These type of graphs, unlike TEG, do not admit a linear representation in (min,+) algebra. To mitigate the problem of nonlinearity, we used a modeling approach defined on a dioid operators. The obtained state model is used to evaluate the performance of GTEG. For this, we proposed a new method to linearize the mathematical model governing the dynamic evolution of the graphical model in order to obtain a linear model in (min,+) algebra. The second part of this work is devoted to the problem of determining the resources to use in a production line, in order to achieve desired performance. These is equivalent to determining the initial marking of the control part of the GTEG.
124

Nástroj pro práci s Objektově orientovanými Petriho sítěmi / Object Oriented Petri Net Tool

Neužil, Antonín January 2020 (has links)
This work deals with the development and use of a graphical editor of object-oriented Petri nets implemented in the PNtalk language. First, Petri nets that expand over time are described here. They are followed by a description of the object-oriented paradigm. Next, the structure of object-oriented Petri nets in the implementation of PNtalk is described here. Further work presents a description of the application design, which shows the entire structure of the application from the perspective of views. The main motivation for creating this tool is the effort to make object-oriented Petri nets accessible to their users. The application was implemented in the JavaFX framework and the whole procedure is given in the following chapter together with testing. The result of the work is presented in the examples contained in the last chapter, which also contains detailed manuals for controlling the application. The tool in cooperation with the PNtalk server enables users to work more pleasantly with OOPN and their visual appearance.
125

Detekce anomálií běhu RTOS aplikace / Detecting RTOS Runtime Anomalies

Arm, Jakub January 2020 (has links)
Due to higher requirements of computational power and safety, or functional safety ofequipments intended for the use in the industrial domain, embedded systems containing areal-time operating system are still the active area of research. This thesis addresses thehardware-assisted control module that is based on the runtime model-based verificationof a target application. This subsystem is intended to increase the diagnostic coverage,particularly, the detection of the execution errors. After the specification of the architecture,the formal model is defined and implemented into hardware using FPGA technology.This thesis also discuss some other aspects and embodies new approaches in the area ofembedded flow control, e.g. the integration of the design patterns. Using the simulation,the created module was tested using the created scenarios, which follow the real programexecution record. The results suggest that the error detection time is lower than usingstandard techniques, such a watchdog.
126

Plánování a rozvrhování / Planning and Scheduling

Hefka, Lukáš Unknown Date (has links)
This thesis deals with optimization problems of planning and scheduling. There are using genetic algorithms which are inspired by evolution process. Main work is familiar with the problem of planning and scheduling, genetic algorithm and Petri nets. This knowledge was used to create applications that would with the use of genetic algorithms was able to solve planning problems and the resulting plans would be represented the Time Petri Net. In conclusion of the this thesis are presented obtained results and examples of field use.
127

Dynamics of a two-level system with priorities and application to an emergency call center / Dynamique d'un système biniveau avec priorités. Application à un centre d'appel d'urgences.

Boeuf, Vianney 18 December 2017 (has links)
Dans cette thèse, nous analysons la dynamique de systèmes à événements discrets avec synchronisation et priorités, au moyen de réseaux de Petri et de réseaux de files d'attente.Nous appliquons cela à l'évaluation de performance d'un centre d'appels d'urgence.Notre motivation de départ est pratique. Pendant la durée de ce travail, un nouveau centre d'appels d'urgence a été mis en place pour l'agglomération parisienne, traitant les appels pour la police et les pompiers.La nouvelle organisation traite les appels en deux niveaux.Un premier niveau d'opérateurs répond aux appels, identifie les appels urgents et traite les appels non urgents.Les opérateurs de second niveau sont spécialistes (policiers ou pompiers) et traitent les demandes d'intervention.Quand un appel est identifié au niveau 1 comme très urgent, l'opérateur reste en ligne avec l'appelant jusqu'à ce qu'un opérateur de niveau 2 réponde. De plus, l'appel est prioritaire.Une conséquence de cette procédure est que, lorsqu'aucun opérateur de niveau 2 n'est disponible, les opérateurs de niveau 1 attendent avec ces appels très urgents, et la capacité du niveau 1 diminue.Nous nous intéressons à l'évaluation de performance de divers systèmes correspondant à cette description générale, dans des situations de saturation.Nous proposons trois modèles différents pour traiter ce type de systèmes.Les deux premiers sont des modèles de réseaux de Petri temporisés.Nous enrichissons les classiques réseaux de Petri à choix libres en autorisant des situations de conflit où le routage est résolu par des priorités.La principale difficulté est alors que l'opérateur de la dynamique n'est plus monotone.Dans un premier modèle, nous proposons une dynamique discrète pour cette classe de réseaux de Petri, avec des temps de séjour constants sur les places.Nous prouvons que les variables compteurs d'une exécution du réseau sont les solutions d'un système affine par morceaux, avec retards.Nous étudions les régimes stationnaires de cette dynamique, et caractérisons les régimes affines comme solutoins d'un système affine par morceaux, qui peut être vu comme un système sur le semi-corps de germes tropical (min plus).Les applications numériques montrent cependant que la convergence ne se fait pas toujours vers ces régimes stationnaires affines.Le second modèle est une transformation continue du précédent. Pour la même classe de réseaux de Petri, nous proposons une dynamique sous forme d'équations différentielles discontinues.Nous établissons l'existence et l'unicité de la solution.L'objectif de cette modélisation est d'obtenir un système plus simple dans lequel les pathologies du temps discret disparaissent. Nous montrons que les régimes stationaires sont les mêmes que ceux de la dynamique discrète. Les simulations numériques semblent montrer que la convergence s'obtient effectivement dans ce cas.Nous modélisons aussi le centre d'appels d'urgence comme un réseau de files d'attente, prenant ainsi en compte le caractère aléatoire des différentes variables du centre d'appel.Pour ce système, nous prouvons que la dynamique, après une transformation d'échelle, converge vers une limite fluide, qui correspond au système d'équations différentielles précédent.Cela conforte notre seconde modélisation.Les principaux outils de la preuve de convergence sont le calcul stochastique pour les processus de Poisson, les formulations de Skorokhod généralisées, ou encore des arguments de couplage.Ainsi, nos trois modèles d'un même centre d'appels d'urgence définissent un même comportement asymptotique schématique, décrivant différentes phases de congestion du centre.Dans une seconde partie de cette thèse, nous analysons des simulations poussées, prenant en compte les nombreux détails de notre étude de cas. Les simulations confirment le comportement schématique prédit par nos modèles mathématiques. Nous discutons aussi des interactions complexes provenant de la nature hétérogène du niveau 2. / In this thesis, we analyze the dynamics of discrete event systems with synchronization and priorities, by the means of Petri nets and queueing networks.We apply this to the performance evaluation of an emergency call center.Our original motivation is practical. During the period of this work, a new emergency call center became operative in Paris area, handling emergency calls to police and firemen.The new organization includes a two-level call treatment. A first level of operators answers calls, identifies urgent calls and handles (numerous) non-urgent calls.Second level operators are specialists (policemen or firemen) and handle emergency demands.When a call is identified at level 1 as extremely urgent, the operator stays in line with the call until a level 2 operator answers. The call has priority for level 2 operators.A consequence of this procedure is that, when level 2 operators are busy, level 1 operators wait with extremely urgent calls, and the capacity of level 1 diminishes.We are interested in the performance evaluation of various systems corresponding to this general description, in stressed situations.We propose three different models addressing this kind of systems.The first two are timed Petri net models.We enrich the classical free choice Petri nets by allowing conflict situations in which the routing is solved by priorities.The main difficulty in this situation is that the operator of the dynamics becomes non monotone.In a first model, we consider discrete dynamics for this class of Petri nets, with constant holding times on places.We prove that the counter variables of an execution of the Petri net are solutions of a piecewise linear system with delays.As far as we know, this proof is new, even for the class of free choice nets, which is a subclass of ours.We investigate the stationary regimes of the dynamics, and characterize the affine ones as solutions of a piecewise linear system, which can be seen as a system over a tropical (min-plus) semifield of germs.Numerical experiments show that, however, convergence does not always holds towards these affine stationary regimes.The second model is a ``continuization'' of the previous one. For the same class of Petri nets, we propose dynamics expressed by differential equations, so that the tokens and time events become continue.For this differential system with discontinuous righthandside, we establish the existence and uniqueness of the solution.By using differential equations, we aim at obtaining a simpler model in which discrete time pathologies disappear. We show that the stationary regimes are the same as the stationary regimes of the discrete time dynamics.Numerical experiments tend to show that, in this setting, convergence effectively holds.We also model the emergency call center described above as a queueing system, taking into account the randomness of the different call center variables.For this system, we prove that, under an appropriate scaling, the dynamics converges to a fluid limit which corresponds to the differential equations of our Petri net model.This provides support for the second model.Stochastic calculus for Poisson processes, generalized Skorokhod formulations and coupling arguments are the main tools used to establish this convergence.Hence, our three models of an identical emergency call center yield the same schematic asymptotic behavior, expressed as a piecewise linear system of the parameters, and describing the different congestion phases of the system.In a second part of this thesis, simulations are carried out and analyzed, taking into account the many subtleties of our case study (for example, we construct probability distributions based on real data analysis).The simulations confirm the schematic behavior described by our mathematical models.We also address the complex interactions coming from the heterogeneous nature of level 2.
128

Modeling and simulation of vehicle to grid communication using hybrid petri nets

Sener, Cansu 08 June 2015 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / With the rapid growth of technology, scientists are trying to find ways to make the world a more efficient and eco-friendly place. The research and development of electric vehicles suddenly boomed since natural resource are becoming very scarce. The significance of an electric vehicle goes beyond using free energy, it is environ- mental friendly. The objective of this thesis is to understand what Vehicle to Grid Communication (V2G) for an electric vehicle is, and to implement a model of this highly efficient system into a Hybrid Petri Net. This thesis proposes a Hybrid Petri net modeling of Vehicle to Grid (V2G) Communication topology. Initially, discrete, continuous, and hybrid Petri net's are defined, familiarized, and exemplified. Secondly, the Vehicle and Grid side of the V2G communication system is introduced in detail. The modeling of individual Petri nets, as well as their combination is discussed thoroughly. Thirdly, in order to prove these systems, simulation and programming is used to validate the theoretical studies. A Matlab embedded simulation program known as SimHPN is used to simulate specific scenario's in the system, which uses Depth-first Search (DFS) Algorithm. In addition to SimHPN simulation program, Matlab program is made to output four levels of the reachability tree as well as specifying duplicate and terminate nodes. This code incorporates a technique known as Breadth-first Search (BFS) Algorithm.
129

Mathematical Formula Recognition and Automatic Detection and Translation of Algorithmic Components into Stochastic Petri Nets in Scientific Documents

Kostalia, Elisavet Elli January 2021 (has links)
No description available.
130

A Multi-Agent Defense Methodology with Machine Learning against Cyberattacks on Distribution Systems

Appiah-Kubi, Jennifer 17 August 2022 (has links)
The introduction of communication technology into the electric power grid has made the grid more reliable. Power system operators gain visibility over the power system and are able to resolve operational issues remotely via Supervisory Control And Data Acquisition (SCADA) technology. This reduces outage periods. Nonetheless, the remote-control capability has rendered the power grid vulnerable to cyberattacks. In December 2015, over 200,000 people in Ukraine became victims of the first publicly reported cyberattack on the power grid. Consequently, cyber-physical security research for the power system as a critical infrastructure is in critical need. Research on cybersecurity for power grids has produced a diverse literature; the multi-faceted nature of the grid makes it vulnerable to different types of cyberattacks, such as direct power grid, supply chain and ransom attacks. The attacks may also target different levels of grid operation, such as the transmission system, distribution system, microgrids, and generation. As these levels are characterized by varying operational constraints, the literature may be categorized not only according to the type of attack it targets, but also according to the level of power system operation under consideration. It is noteworthy that cybersecurity research for the transmission system dominates the literature, although the distribution system is noted to have a larger attack surface. For the distribution system, a notable attack type is the so-called direct switching attack, in which an attacker aims to disrupt power supply by compromising switching devices that connect equipment such as generators, and power grid lines. To maximize the damage, this attack tends to be coordinated as the attacker optimally selects the nodes and switches to attack. This decision-making process is often a bi- or tri-level optimization problem which models the interaction between the attacker and the power system defender. It is necessary to detect attacks and establish coordination/correlation among them. Determining coordination is a necessary step to predict the targets of an attack before attack completion, and aids in the mitigation strategy that ensues. While the literature has addressed the direct switching attack on the distribution system in different ways, there are also shortcomings. These include: (i) techniques to establish coordination among attacks are centralized, making them prone to single-point failures; (ii) techniques to establish coordination among attacks leverage only power system models, ignoring the influence of communication network vulnerabilities and load criticality in the decisions of the attacker; (iii) attacker-defender optimization models assume specific knowledge of the attacker resources and constraints by the defender, a strong unrealistic assumption that reduces their usability; (iv) and, mitigation strategies tend to be static and one-sided, being implemented only at the physical level, or at the communication network level. In light of this, this dissertation culminates in major contributions concerning real-time decentralized correlation of detected direct switching attacks and hybrid mitigation for electric power distribution systems. Concerning this, four novel contributions are presented: (i) a framework for decentralized correlation of attacks and mitigation; (ii) an attacker-defender optimization model that accounts for power system laws, load criticality, and cyber vulnerabilities in the decision-making process of the attacker; (iii) a real-time learning-based mechanism for determining correlation among detected attacks and predicting attack targets, and which does not assume knowledge of the attacker's resources and constraints by the power system defender; (iv) a hybrid mitigation strategy optimized in real-time based on information learned from detected attacks, and which combines both physical level and communication network level mitigation. Since the execution of intrusion detection systems and mechanisms such as the ones proposed in this dissertation may deter attackers from directly attacking the power grid, attackers may perform a supply chain cyberattack to yield the same results. Although, supply chain cyberattacks have been acknowledged as potentially far-reaching, and compliance directives put forward for this, the detection of supply chain cyberattacks is in a nascent stage. Consequently, this dissertation also proposes a novel method for detecting supply chain cyberattacks. To the best of the knowledge of the author, this work is the first preliminary work on supply chain cyberattack detection. / Doctor of Philosophy / The electric power grid is the network that transports electricity from generation to consumers, such as homes and factories. The power grid today is highly remote-monitored and controlled. Should there be a fault on the grid, the human operator, often remotely located, may only need to resolve it by sending a control signal to telemetry points, called nodes, via a communication network. This significantly reduces outage periods and improves the reliability of the grid. Nonetheless, the high level connectivity also exposes the grid to cyberattacks. The cyber connectivity between the power grid and the human operator, like all communication networks, is vulnerable to cyberattacks that may allow attackers to gain control of the power grid. If and when successful, wide-spread and extended outages, equipment damage, etc. may ensue. Indeed, in December 2015, over 200,000 people in Ukraine became victims to the first publicly reported cyberattack on a power grid. As a critical infrastructure, cybersecurity for the power grid is, therefore, in critical need. Research on cybersecurity for power grids has produced a diverse literature; the multi-faceted nature of the grid makes it vulnerable to different types of cyberattacks, such as direct power grid, supply chain and ransom attacks. Notable is the so-called direct switching attack, in which an attacker aims to compromise the power grid communication network in order to toggle switches that connect equipment such as generators, and power grid lines. The aim is to disrupt electricity service. To maximize the damage, this attack tends to be coordinated; the attacker optimally selects several grid elements to attack. Thus, it is necessary to both detect attacks and establish coordination among them. Determining coordination is a necessary step to predict the targets of an attack before attack completion. This aids the power grid owner to intercept and mitigate attacks. While the literature has addressed the direct switching attack in different ways, there are also shortcomings. Three outstanding ones are: (i) techniques to determine coordination among attacks and predict attack targets are centralized, making them prone to single-point failures; (ii) techniques to establish coordination among attacks leverage only power system physical laws, ignoring the influence of communication network vulnerabilities in the decisions of the attacker; (iii) and, studies on the interaction between the attacker and the defender (i.e., power grid owner) assume specific knowledge of the attacker resources and constraints by the defender, a strong unrealistic assumption that reduces their usability. This research project addresses several of the shortcomings in the literature, particularly the aforementioned. The work focuses on the electric distribution system, which is the power grid that connects directly to consumers. Indeed, this choice is ideal, as the distribution system has a larger attack surface than other parts of the grid and is characterized by computing devices with more constrained computational capability. Thus, adaptability to simple computing devices is a priority. The contributions of this dissertation provide leverage to the power grid owner to intercept and mitigate attacks in a resilient manner. The original contributions of the work are: (i) a novel realistic model that shows the decision making process of the attacker and their interactions with the defender; (ii) a novel decentralized mechanism for predicting the targets of coordinated cyberattacks on the electric distribution grid in real-time and which is guided by the attack model, (iii) and a novel hybrid optimized mitigation strategy that provides security to the power grid at both the communication network level and the physical power grid level. Since the power grid is constructed with smart equipment from various vendors, attackers may launch effective attacks by compromising the devices deployed in the power grid through a compromised supply chain. By nature, such an attack is evasive to traditional intrusion detection systems and algorithms such as the aforementioned. Therefore, this work also provides a new method to defend the grid against supply chain attacks, resulting in a mechanism for its detection in a critical power system communication device.

Page generated in 0.1606 seconds